Tamper-Evident Complex Genomic Networks

Networks are important storage data structures now used to store personal information of individuals around the globe. With the advent of personal genome sequencing, networks are going to be used to store personal genomic sequencing of people. In contrast to social media networks, the importance of...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Batool, Komal, Niazi, Muaz A
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Batool, Komal
Niazi, Muaz A
description Networks are important storage data structures now used to store personal information of individuals around the globe. With the advent of personal genome sequencing, networks are going to be used to store personal genomic sequencing of people. In contrast to social media networks, the importance of relationships in this genomic network is extremely significant. Losing connections between individuals thus implies losing relationship information (E.g. father or son etc.). There currently exists a considerably serious problem in the current approach to storing network data. Simply stated, network data is not tamper-evident. In other words, if some links or nodes were changed/removed/added by a malicious attacker, it would be impossible for the administrator to detect such changes. While, in the current age of social media networks, change in node characteristics and links can be bad in terms of relationships, in the case of networks for storing personal genomes, the results could be truly devastating. Here we present a scheme for building tamper-evident networks using a combination of Cryptographic and Ego-based Network analytic methods. Using actual published data-sets, we also demonstrate the utility and validity of the scheme besides demonstrating its working in various possible scenarios of usage. Results from the extensive experiments demonstrate the validity of the proposed approach.
doi_str_mv 10.48550/arxiv.1708.05926
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1708_05926</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1708_05926</sourcerecordid><originalsourceid>FETCH-LOGICAL-a676-8761d34a737364deca6bba10fa35717c54dcfa695255367602d3f4410d6de1853</originalsourceid><addsrcrecordid>eNotzr0OgjAYheEuDga9ACfZnMCW9mtxNAR_EqILO_mkJWm0QqpBvXsVnc70njyEzBiNRQpAl-ifto-ZomlMYZXIMVmU6Drjo7y32lzvYda67mKe4dZcW2fr8GDuj9afbxMyavByM9P_BqTc5GW2i4rjdp-tiwilklGqJNNcoOKKS6FNjfJ0QkYb5KCYqkHoukG5ggSAfwKaaN4IwaiW2rAUeEDmv9tBWnXeOvSv6iuuBjF_A20DOeY</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Tamper-Evident Complex Genomic Networks</title><source>arXiv.org</source><creator>Batool, Komal ; Niazi, Muaz A</creator><creatorcontrib>Batool, Komal ; Niazi, Muaz A</creatorcontrib><description>Networks are important storage data structures now used to store personal information of individuals around the globe. With the advent of personal genome sequencing, networks are going to be used to store personal genomic sequencing of people. In contrast to social media networks, the importance of relationships in this genomic network is extremely significant. Losing connections between individuals thus implies losing relationship information (E.g. father or son etc.). There currently exists a considerably serious problem in the current approach to storing network data. Simply stated, network data is not tamper-evident. In other words, if some links or nodes were changed/removed/added by a malicious attacker, it would be impossible for the administrator to detect such changes. While, in the current age of social media networks, change in node characteristics and links can be bad in terms of relationships, in the case of networks for storing personal genomes, the results could be truly devastating. Here we present a scheme for building tamper-evident networks using a combination of Cryptographic and Ego-based Network analytic methods. Using actual published data-sets, we also demonstrate the utility and validity of the scheme besides demonstrating its working in various possible scenarios of usage. Results from the extensive experiments demonstrate the validity of the proposed approach.</description><identifier>DOI: 10.48550/arxiv.1708.05926</identifier><language>eng</language><subject>Computer Science - Cryptography and Security ; Computer Science - Databases ; Computer Science - Networking and Internet Architecture ; Computer Science - Social and Information Networks</subject><creationdate>2017-08</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,778,883</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1708.05926$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1708.05926$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Batool, Komal</creatorcontrib><creatorcontrib>Niazi, Muaz A</creatorcontrib><title>Tamper-Evident Complex Genomic Networks</title><description>Networks are important storage data structures now used to store personal information of individuals around the globe. With the advent of personal genome sequencing, networks are going to be used to store personal genomic sequencing of people. In contrast to social media networks, the importance of relationships in this genomic network is extremely significant. Losing connections between individuals thus implies losing relationship information (E.g. father or son etc.). There currently exists a considerably serious problem in the current approach to storing network data. Simply stated, network data is not tamper-evident. In other words, if some links or nodes were changed/removed/added by a malicious attacker, it would be impossible for the administrator to detect such changes. While, in the current age of social media networks, change in node characteristics and links can be bad in terms of relationships, in the case of networks for storing personal genomes, the results could be truly devastating. Here we present a scheme for building tamper-evident networks using a combination of Cryptographic and Ego-based Network analytic methods. Using actual published data-sets, we also demonstrate the utility and validity of the scheme besides demonstrating its working in various possible scenarios of usage. Results from the extensive experiments demonstrate the validity of the proposed approach.</description><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Databases</subject><subject>Computer Science - Networking and Internet Architecture</subject><subject>Computer Science - Social and Information Networks</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotzr0OgjAYheEuDga9ACfZnMCW9mtxNAR_EqILO_mkJWm0QqpBvXsVnc70njyEzBiNRQpAl-ifto-ZomlMYZXIMVmU6Drjo7y32lzvYda67mKe4dZcW2fr8GDuj9afbxMyavByM9P_BqTc5GW2i4rjdp-tiwilklGqJNNcoOKKS6FNjfJ0QkYb5KCYqkHoukG5ggSAfwKaaN4IwaiW2rAUeEDmv9tBWnXeOvSv6iuuBjF_A20DOeY</recordid><startdate>20170819</startdate><enddate>20170819</enddate><creator>Batool, Komal</creator><creator>Niazi, Muaz A</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20170819</creationdate><title>Tamper-Evident Complex Genomic Networks</title><author>Batool, Komal ; Niazi, Muaz A</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a676-8761d34a737364deca6bba10fa35717c54dcfa695255367602d3f4410d6de1853</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Databases</topic><topic>Computer Science - Networking and Internet Architecture</topic><topic>Computer Science - Social and Information Networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Batool, Komal</creatorcontrib><creatorcontrib>Niazi, Muaz A</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Batool, Komal</au><au>Niazi, Muaz A</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Tamper-Evident Complex Genomic Networks</atitle><date>2017-08-19</date><risdate>2017</risdate><abstract>Networks are important storage data structures now used to store personal information of individuals around the globe. With the advent of personal genome sequencing, networks are going to be used to store personal genomic sequencing of people. In contrast to social media networks, the importance of relationships in this genomic network is extremely significant. Losing connections between individuals thus implies losing relationship information (E.g. father or son etc.). There currently exists a considerably serious problem in the current approach to storing network data. Simply stated, network data is not tamper-evident. In other words, if some links or nodes were changed/removed/added by a malicious attacker, it would be impossible for the administrator to detect such changes. While, in the current age of social media networks, change in node characteristics and links can be bad in terms of relationships, in the case of networks for storing personal genomes, the results could be truly devastating. Here we present a scheme for building tamper-evident networks using a combination of Cryptographic and Ego-based Network analytic methods. Using actual published data-sets, we also demonstrate the utility and validity of the scheme besides demonstrating its working in various possible scenarios of usage. Results from the extensive experiments demonstrate the validity of the proposed approach.</abstract><doi>10.48550/arxiv.1708.05926</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.1708.05926
ispartof
issn
language eng
recordid cdi_arxiv_primary_1708_05926
source arXiv.org
subjects Computer Science - Cryptography and Security
Computer Science - Databases
Computer Science - Networking and Internet Architecture
Computer Science - Social and Information Networks
title Tamper-Evident Complex Genomic Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T14%3A15%3A20IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Tamper-Evident%20Complex%20Genomic%20Networks&rft.au=Batool,%20Komal&rft.date=2017-08-19&rft_id=info:doi/10.48550/arxiv.1708.05926&rft_dat=%3Carxiv_GOX%3E1708_05926%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true